Call For Papers
Contact Us

  Emerging Issues in Cyber Security for Institutions of Higher Education  
  Authors : Mayieka Jared Maranga; Dr. Masese Nelson
  Cite as:


Institutions of higher learning find themselves engaged in an expensive defense race in buying current security tools and changing their strategies in countering latest cyber security attacks. These strategies are meant to promote operational protection and response to potential attacks on their cyberspace. In the meantime, the attackers are continuously finding ways around those set tools and are able to switch their strategies to hit their different targets. This paper therefore looks at ways through which these organizations are attacked, the extent of the attacks and how the institutions of higher learning can prepare and defend themselves against cyber-attacks. Systematic Literature Review was used to dig deeper to the existing secondary data. It was indeed discovered that Institutions of higher learning are frequently attacked and infiltrated for reasons such as modification of data such as school fees etc. by both internal agents such as students and staff and external agents such as competitors and malicious attackers. We finally make recommendations on what such institutions should do to defend themselves against such attacks.


Published In : IJCSN Journal Volume 8, Issue 4

Date of Publication : August 2019

Pages : 371-379

Figures :01

Tables : --


Mayieka Jared Maranga : is a PhD student at Kabarak University- Kenya. He holds a Master of Science in Information Technology degree [2012] and Bachelor of Business Information Technology [2009] from Strathmore University; He has worked as: a graduate assistant at Strathmore University (2009 - 2012), an assistant lecturer at Strathmore University's Faculty of Information Technology (2012 - 2014), adjunct faculty as United States International University's School of Science and Technology (2015 - 2016) and an assistant lecturer at Africa International University (2016 to date). His current research interests are generally around Computer Security and Audit and Databases.

Masese Bogomba Nelson : holds PhD from Kibabii University Kenya. He is currently a lecturer in Information Technology at Kabarak University Kenya. His research interests include mobile applications, security and IoT.


cyber security, cybercrime, cyber ethics, social media, & cloud computing

Institutions of higher learning in Kenya and indeed in Africa and the globe in general are facing highly increasing cyber-threats.


[1] Ashwin, P. (2016, August 10). Security is more than User Education - it's About Cultural Change. Retrieved from www.cso.com.au: https://www.cso.com.au/article/604844/security-morethan- user-education-it-about-cultural-change/ [2] Cheng, L. (2016). Chinese Politics in the Xi Jinping Era: Reassessing Collective Leadership. Washington, D.C.: Brookings Institution Press. [3] Christopher, H., & Michele, F. (2015). Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails. Hoboken, New Jersey: Wiley. [4] Communications Authority of Kenya; Kenya National Bureau of Statistics. (2017). The Public Sector ICT survey 2016. Nairobi: Kenya National Bureau of Statistics. [5] David, B. (2016, June 5th). 6 Common Phishing Attacks and How to Protect Against Them. Retrieved August 13, 2019, from The State of Security: https://www.tripwire.com/state-of-security/securityawareness/ 6-common-phishing-attacks-and-how-toprotect- against-them/ [6] David, D. L., Robert, A. K., & Matthew, C. M. (2012). mHealth Data Security: The Need for HIPAA-Compliant Standardization. Telemedicine and e-Health, 18(4), 284 - 288. [7] David, H. (2017, August 29). Security and Education. Retrieved from welivesecurity.com: https://www.welivesecurity.com/2017/08/29/securityand- education/ [8] David, K., & Michael, G. S. (2013). Fundamentals of Information Systems Security. Burlington, Massachusetts: Jones & Bartlett Publishers. [9] EDUCAUSE. (n.d.). Building Technology Strategy that Enables Next Generation Enterprise IT. Retrieved July 12, 2019, from www.educause.edu: https://www.educause.edu/focus-areas-andinitiatives/ enterprise-and-infrastructure/enterprise-itprogram/ building-technology-strategy-that-enables-nextgeneration- enterprise-it [10] Eric, B. (2018). Using Security Apps and Backup. Berkeley, CA: Apress,. [11] Folashade, B. O., & Adeta, A. K. (2013). The Nature, Causes and Consequences of Cyber Crime in Tertiary Institutions in Zaria-Kaduna State, Nigeria. American International Journal of Contemporary Research, 3(9), 98 - 114. [12] Harold, F. T., & Micki, K. (2003). Information Security Management Handbook. Boca Raton, Florida: CRC Press. [13] Jakob, N. (2004, October 25). User Education Is Not the Answer to Security Problems. Retrieved from Nielsen Norman Group: World Leaders in Research-Based User Experience: https://www.nngroup.com/articles/securityand- user-education/ [14] Jan, C., Ronald, L., & Dieter, S. (2011). Digital Privacy: PRIME - Privacy and Identity Management for Europe. Heidelberg, Germany: Springer Science & Business Media. [15] Kai, G., Marcel, T., Bastian, W., & Markus, R. (2018). Comparison of approaches to encrypt data for supply chain simulation applications in cloud environments. WSC '18 Proceedings of the 2018 Winter Simulation Conference. Gothenburg, Sweden: IEEE Press Piscataway, NJ, USA. [16] Lee, Y.-J. (2019). Masese Bogomba Nelson holds PhD from Kibabii University Kenya, He is currently. IndianJournals.com, 19(2). [17] Ministry of Information, Communications and Technology. (2014, April 20). National Security Strategy 2014. Nairobi. Retrieved August 2019, 13th, from http://icta.go.ke/pdf/NATIONAL%20CYBERSECURIT Y%20STRATEGY.pdf [18] Mostafa, E., Mohamed, B., & Faddoul, K. (2017). Advanced Information Technology, Services and Systems: Proceedings of the International Conference on Advanced Information Technology, Services and Systems (AIT2S-17) Held on April 14/15, 2017 in Tangier. York City: Springer. [19] Nikhita, R. G., & Ugander, R. G. (2014, January). A Study of Cyber Security Challenges and Its Emerging Trends on Latest Technologies. International Journal of Engineering and Technology, Volume 4 (1). [20] Peter, M., & Kenneth, E. (2018). Design and Analysis for Quantitative Research in Music Education. Oxford, U.K: Oxford University Press. [21] Resources Management, A. I. (Ed.). (2018). Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications: Concepts, Methodologies, Tools, and Applications. Hershey, Pennsylvania: IGI Global. [22] Tanya, R. (2015, November 2). The Top 10 Higher Ed IT Issues of 2016. Retrieved August 13, 2019, from Center for Digital Education (EDUCAUSE): https://www.govtech.com/education/higher-ed/The-Top- 10-Higher-Ed-IT-Issues-of-2016.html [23] Tanya, R. (2016, May 18). 8 Cybersecurity Challenges Facing Higher Education. Retrieved August 13, 2019, from Centre for Digital Education: https://www.govtech.com/education/higher-ed/8- Cybersecurity-Challenges-Facing-Higher-Education.html [24] Trend, M. (2015, March 9). The challenges of cyber security education and training in 2015. Retrieved from https://blog.trendmicro.com: https://blog.trendmicro.com/the-challenges-of-cybersecurity- education-and-training-in-2015/.